diff options
| author | Davide Caratti <[email protected]> | 2021-05-19 13:17:21 +0000 |
|---|---|---|
| committer | David S. Miller <[email protected]> | 2021-05-19 20:10:24 +0000 |
| commit | 05ff8435e50569a0a6b95e5ceaea43696e8827ab (patch) | |
| tree | b73493aa05464777f897edc7690e2119f8efd85a /net/sched/cls_api.c | |
| parent | Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next (diff) | |
| download | kernel-05ff8435e50569a0a6b95e5ceaea43696e8827ab.tar.gz kernel-05ff8435e50569a0a6b95e5ceaea43696e8827ab.zip | |
net/sched: cls_api: increase max_reclassify_loop
modern userspace applications, like OVN, can configure the TC datapath to
"recirculate" packets several times. If more than 4 "recirculation" rules
are configured, packets can be dropped by __tcf_classify().
Changing the maximum number of reclassifications (from 4 to 16) should be
sufficient to prevent drops in most use cases, and guard against loops at
the same time.
Signed-off-by: Davide Caratti <[email protected]>
Signed-off-by: David S. Miller <[email protected]>
Diffstat (limited to 'net/sched/cls_api.c')
| -rw-r--r-- | net/sched/cls_api.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/sched/cls_api.c b/net/sched/cls_api.c index 40fbea626dfd..75e3a288a7c8 100644 --- a/net/sched/cls_api.c +++ b/net/sched/cls_api.c @@ -1531,7 +1531,7 @@ static inline int __tcf_classify(struct sk_buff *skb, u32 *last_executed_chain) { #ifdef CONFIG_NET_CLS_ACT - const int max_reclassify_loop = 4; + const int max_reclassify_loop = 16; const struct tcf_proto *first_tp; int limit = 0; |
